Persuasive Essay On Iphone Security

Improved Essays
In current events, the United States government has demanded that Apple decrypt the iPhone of Syed Rizwan Farook, a shooter involved in the San Bernardino attacks. On the surface, this mandate seems harmless; after all, the government simply wants to access Farook’s phone in hopes of preventing similar, future attacks. However, reality proves far more ambiguous and has become a quagmire; there is certainly more going on here than meets the eye. These bizarre turn of events can potentially be pernicious to the American public’s freedom and security in general, and these same circumstances—if not diagnosed and redressed now—may have irrevocable consequences.
For starters, the Federal Bureau of Investigations (FBI) has had myriad options and roads
…show more content…
If the public knew that iPhone was no longer secure, no one would have a reason to use the iPhone anymore. The “bad guys” would know this too, of course, and immediately cease usage of these devices. Doing this would be an awful business decision for Apple and far from what anyone would call strategic. It is not simply bad for Apple either: if the government can force Apple to create a backdoor into iPhones, it can force every, single phone-making company into creating backdoors for every, single phone in the United States. The very notion of security on mobile devices would be expunged from existence as we know it.
However, these are just some of the consequences that the future—in the direction it is heading—might bring; there are several intriguing things about past events as well. Apple creating this Gov-OS (assuming that route is even possible) was not the only—or even the best— course of action the FBI could have taken in handling Farook’s iPhone. There are several ways to elude the iPhone’s typical security functions that can only be abused when the iPhone has not shut off since the last valid
…show more content…
If the iCloud password had not been tampered with, then the phone could have begun backing to the iCloud, but changing the password severed the connection between the phone and the iCloud, since the phone needed a valid login since the password change to begin backing up. (The correct password being something that the FBI does not have.) Both the FBI and Apple agreed that letting the iPhone connect to the iCloud would have been a viable option.
The second mistake was letting the phone power down. Now, the FBI has recently claimed that they found the phone in a powered-down state. However, this conflicts with their previous stance: the iCloud was indeed a viable solution to accessing information from the phone. If they had found the phone already powered down, then the phone would not have automatically started backing up to the iCloud because it had not recently been validly logged into. These inconsistencies suggest that the FBI has not been thoroughly honest with their evidence, or that they had just lost their minds for a few brief moments

Related Documents

  • Decent Essays

    Pros And Cons Of Hacking

    • 434 Words
    • 2 Pages

    And my evidence is that only about 51% say that is should be unlocked and about 39% people say that they should not unlocked the phone. But the Apple company is like they should not give the software to the FBI but if they lose the case they will have to unlock the phone. But then the Apple company is have trouble with the FBI but the Apple company has some rules so that they will not unlock the phone. I wonder if the Apple company will still make a updated phone so that the FBI will not get in people phone any more. But I hope the FBI will leave the Apple compon alone and just find some hacker to open it.…

    • 434 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Mitch Albom, author of “Mitch Albom: FBI vs. Apple about more than a phone”, builds an overall effective editorial that supports the readers point of view by fighting for the protection of our phone information. In this case, a man named Syed Farook, killed and injured several people, including his wife. The FBI believes that accessing information from his phone may be able to help them with their case. They order Apple to build a new software that will allow them to bust into phones by being able to guess passwords as many times as they want; as of now, someone can only guess a password 10 times before the information is lost. In court, the FBI fights that the law requires businesses not involved in the case, have to execute court orders.…

    • 1079 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    4th Amendment Case Study

    • 276 Words
    • 2 Pages

    The FBI has been trying to hack Syed Farook’s iPhone but Apple would not allow them due to the 4th amendment. “Basic American rights were at stake, and the purpose of the law is to protect people’s rights” (Tribune News Service). That information shows how the FBI would be going against one of the rights listed in the constitution. Furthermore, customers could have…

    • 276 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Post 9/11 Privacy Rights: The Case Against Electronic Surveillance In response to concerns about terrorism after the attacks on September 11,2001, the government of the United States enacted new guidelines for conducting surveillance on the public. This paper will discuss the implementation of electronic surveillance as a tool to combat terrorism and will make the case against sweeping electronic surveillance of American citizens and others in this country. Various examples of increased surveillance along with decreasing privacy right will help the reader to conclude that these tactics have not reduced incidents of any type of crime, including terrorism. This paper will also discuss several types of electronic surveillance, including the collection of metadata from telephone records, which intruded on the private lives of citizens and did not increase their safety in any meaningful way.…

    • 1377 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Apple Vs Fbi Essay

    • 521 Words
    • 3 Pages

    To add on, the FBI is only asking to break into one phone and for a very strong reason, with a warrant from the court and lots of support from high authorities and many american citizens. Imagine if, Apple does not comply with the FBI’s askings then this could lead to not being able to prevent a terrorist attack and for an example another shooting or 9/11 could…

    • 521 Words
    • 3 Pages
    Improved Essays
  • Brilliant Essays

    Apple Vs FBI

    • 1982 Words
    • 8 Pages

    Some have tried to claim that it was dubious as to whether it was even possible for Apple to create a piece of software that performed what the FBI was demanding. This is a much more logically consistent counter argument because one cannot do the impossible, but the counter argument can be refuted via induction. Apple could automatically update iPhones without permission (Landau 1398). Apple has automatically updated iPhones without permission in the past (Landau 1398), and so Apple could do so again to install this back door. Also, based on the research lead by Dr. Choi (an expert in computer engineering), updates to the firmware of the smart phone could be utilized to create a back door program (39).…

    • 1982 Words
    • 8 Pages
    Brilliant Essays
  • Great Essays

    Trevor Timm of The Guardian adds to this, saying “analysts would search over 17,000 phone numbers…every day. It turns out only about 1,800 of those numbers – 11 percent – met the legal requirement that the NSA have ‘reasonable articulable suspicion’ that the number was involved in terrorism” (Timm, Trevor). Both the NSA and President Obama have claimed repeatedly that the NSA has not abused its power, yet a “FISA court…

    • 2021 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    The Department of Homeland Security and the US Patriot Act where created and passed as a direct result of the terrorist attacks orchestrated on September 11, 2001. As a package, both work to preserve life and liberty to citizens of the United States, whether in the homeland or abroad. Therefore, the Department of Homeland Security, while utilizing the US Patriot Act, has partnered with local law enforcement in order to be on the front lines of detecting and preventing homeland terrorism. The Department of Homeland Security, through the use of the US Patriot Act, has affected the local criminal justice process through the militarization of law enforcement and the deployment of cutting edge surveillance techniques and equipment.…

    • 1384 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Apple should not provide the encryption code to unlock the iPhone of Syed Farook- one of the San Bernardino Shooters. Though the U.S government is seeking this encryption code in the name of national security, this access to millions of American’s personal information can too easily lead to the compromise of people’s 4th amendment rights. Moreover, this access may increase the targeting of minority groups such as Muslim American and African Americans. Using examples from Rampage and The New Jim Crow, I will demonstrate that this breach of privacy should be avoided and prove that it is inessential to combating domestic terrorism.…

    • 1154 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    On June 6th, 2013 The Guardian and the Washington Post revealed the fact that the NSA had access to customer information on Apple, Microsoft, and Google computer products. The information obtained by the NSA was allegedly used to prevent any terrorist actions. However, the NSA has “[built] up a store of information on millions of US citizens, regardless of whether or not they are ‘persons of interest’ to the agency” (Brown). Although terrorist plots are a legitimate threat to America, the U.S government has overstepped its boundaries by violating the citizen’s of America’s fourth amendment right to privacy.…

    • 544 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    Iphones, Inc. Case Study

    • 1642 Words
    • 7 Pages

    A very recent topic that has been circulating in the news is the topic of the FBI and the company known as Apple. Apple is known for its many products ranging from iPhones, MacBook’s, and watches that most of you, I imagine, have. The controversy surrounds an iPhone 5c that was found to be the work phone of one of the two Islamic San Bernardino terrorists. The FBI is requesting that Apple creates a backdoor to install on the phone to disable its security features. Apple does not want to do this for privacy reasons.…

    • 1642 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    The current Apple case doesn’t involve a backdoor in the traditional sense. The FBI is asking Apple to create a tool that would circumvent a feature that deletes all of the information on the phone after 10 failed password attempts. Apple doesn’t want to break anyone’s encryption or set a master key loose on the land. Also, the authority over the master key that Apple would grant the FBI could be used again across a range of scenarios that weaken Apple’s privacy and security as well. 5.…

    • 701 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    With the new technology we spew each year, promising us new ways to keep us secure. The everyday user usually does not realize how unprotected their newly purchased appliances really are. More people are getting attacked, scammed, and are being robbed everyday due to the lack of knowledge people have about their appliances. So eventually with people placing their personal info into these accessible and yet vulnerable phones and computers, those same people will get riled up with the amounts of times they have been hacked into and would declare that their government should do something about their unfortunate situation. The real issue isn’t about the accessibility of our private information, but whether or not society is willing to sacrifice…

    • 860 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In our modern day society, individuals are actively on the internet, exposing themselves in every aspect unknowingly. We are oblivious to who is watching and collecting our information. Many of us are oblivious to how far the government is willing to go to uncover any secrets or imminent threats. In Peter Singer’s essay, Visible Man, we explore how we have currently encircled ourselves in an environment that calculates our every choice and action because we constantly reveal our information. Singer explains how we have deliberately invited the government into our private lives.…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Introduction This article, Building A “Backdoor” To The iPhone: An Ethical Dilemma, discusses Tim Cook, CEO of Apple, ethical dilemma to safeguard its customer’s trust and digital privacy or assist the U.S. government and the Federal Bureau of Investigation (FBI) to gain access to an iPhone device used by a terrorist to commit a heinous crime against society in the city of San Bernardino, California. In addition, evaluate methods in which managers with power and responsibilities characterized by Badaracco, an ethics professor at Harvard University, as the “dirty-hands problem” and the “right-versus-right” difficulties where “the moral dilemmas of management are, at bottom, clashes among different, conflicting moralities, among very different…

    • 1298 Words
    • 6 Pages
    Great Essays